{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T13:10:08Z","timestamp":1751807408464,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319988269"},{"type":"electronic","value":"9783319988276"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98827-6_33","type":"book-chapter","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T15:48:21Z","timestamp":1534780101000},"page":"352-357","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reputation Rating Algorithm for BGP Links"],"prefix":"10.1007","author":[{"given":"Hospice Alfred","family":"Arouna","sequence":"first","affiliation":[]},{"given":"Lionel","family":"Metongnon","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Lobelle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,21]]},"reference":[{"issue":"6","key":"33_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MNET.2012.6375891","volume":"26","author":"E Biersack","year":"2012","unstructured":"Biersack, E., et al.: Visual analytics for BGP monitoring and prefix hijacking identification. IEEE Netw. 26(6), 33\u201339 (2012)","journal-title":"IEEE Netw."},{"issue":"1","key":"33_CR2","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/JPROC.2009.2034031","volume":"98","author":"K Butler","year":"2010","unstructured":"Butler, K., Farley, T.R., McDaniel, P., Rexford, J.: A survey of BGP security issues and solutions. Proc. IEEE 98(1), 100\u2013122 (2010)","journal-title":"Proc. IEEE"},{"key":"33_CR3","unstructured":"CAIDA: List-of-challenges. https:\/\/github.com\/CAIDA\/bgp-hackathon\/wiki\/List-of-Challenges#linkrank-1"},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-642-21599-5_20","volume-title":"Trust and Trustworthy Computing","author":"J Chang","year":"2011","unstructured":"Chang, J., et al.: AS-TRUST: a trust quantification scheme for autonomous systems in BGP. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 262\u2013276. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21599-5_20"},{"issue":"3","key":"33_CR5","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/JSYST.2012.2221856","volume":"7","author":"J Chang","year":"2013","unstructured":"Chang, J., et al.: AS-CRED: reputation and alert service for interdomain routing. IEEE Syst. J. 7(3), 396\u2013409 (2013)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"33_CR6","doi-asserted-by":"publisher","first-page":"117","DOI":"10.7155\/jgaa.00102","volume":"9","author":"L Colitti","year":"2005","unstructured":"Colitti, L., Di Battista, G., Mariani, F., Patrignani, M., Pizzonia, M.: Visualizing interdomain routing with BGPlay. J. Graph Algorithms Appl. 9(1), 117\u2013148 (2005)","journal-title":"J. Graph Algorithms Appl."},{"key":"33_CR7","unstructured":"Cymru, T.: The bogon reference. http:\/\/www.team-cymru.org\/bogon-reference.html"},{"key":"33_CR8","doi-asserted-by":"publisher","unstructured":"Dainotti, A., et al.: Analysis of country-wide internet outages caused by censorship. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, pp. 1\u201318. ACM, New York (2011). https:\/\/doi.org\/10.1145\/2068816.2068818","DOI":"10.1145\/2068816.2068818"},{"issue":"2","key":"33_CR9","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/SURV.2011.041010.00041","volume":"13","author":"G Huston","year":"2011","unstructured":"Huston, G., Rossi, M., Armitage, G.: Securing BGP - a literature survey. IEEE Commun. Surv. Tutor. 13(2), 199\u2013222 (2011)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"33_CR10","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1145\/2829988.2787494","volume":"45","author":"M Konte","year":"2015","unstructured":"Konte, M., Perdisci, R., Feamster, N.: ASwatch: an as reputation system to expose bulletproof hosting ASes. ACM SIGCOMM Comput. Commun. Rev. 45(4), 625\u2013638 (2015)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Lad, M., Zhang, L., Massey, D.: Link-Rank: a graphical tool for capturing BGP routing dynamics. In: 2004 IEEE\/IFIP Network Operations and Management Symposium, NOMS 2004, vol. 1, pp. 627\u2013640. IEEE (2004)","DOI":"10.1109\/NOMS.2004.1317749"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Orsini, C., King, A., Giordano, D., Giotsas, V., Dainotti, A.: BGPStream: a software framework for live and historical BGP data analysis. In: Proceedings of the 2016 ACM on Internet Measurement Conference, pp. 429\u2013444. ACM (2016)","DOI":"10.1145\/2987443.2987482"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T., Hares, S.: A border gateway protocol 4 (BGP-4) RFC 4271. Technical report (2005)","DOI":"10.17487\/rfc4271"},{"key":"33_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/978-981-10-3153-3_76","volume-title":"Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications","author":"AU Prem Sankar","year":"2017","unstructured":"Prem Sankar, A.U., Poornachandran, P., Ashok, A., Manu, R.K., Hrudya, P.: B-Secure: a dynamic reputation system for identifying anomalous BGP paths. In: Satapathy, S.C., Bhateja, V., Udgata, S.K., Pattnaik, P.K. (eds.) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. AISC, vol. 515, pp. 767\u2013775. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-3153-3_76"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Yu, H., Rexford, J., Felten, E.W.: A distributed reputation approach to cooperative internet routing protection. In: 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec), pp. 73\u201378. IEEE (2005)","DOI":"10.1109\/NPSEC.2005.1532057"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98827-6_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T12:31:18Z","timestamp":1751805078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98827-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319988269","9783319988276"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98827-6_33","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}